Information security

View Practice Compliance by content type:

Latest Practice Compliance News

Featured Practice Compliance content

Practice notes
AML and counter-terrorist financing—source of funds and source of wealthSource of funds and wealth was a key focus of the SRA’s Preventing Money...
Read More >
19th May
Practice notes
IP COMPLETION DAY: 11pm (GMT) on 31 December 2020 marks the end of the Brexit transition/implementation period entered into following the UK’s...
Read More >
19th May
Practice notes
Compliance officer for legal practice—COLP—title and duties 2011 [Archived]The compliance officer for legal practice (COLP) sits at the heart of the...
Read More >
19th May
Practice notes
Brexit—exiting the EU under Article 50 [Archived]ARCHIVED: This Practice Note has been archived and is not maintained.This Practice Note contains...
Read More >
Produced in partnership with Adam Cygan of University of Leicester 19th May
Practice notes
SRA Accounts Rules 2019This Practice Note sets out the requirements of the SRA Accounts Rules 2019 (the 2019 Rules), in force from 25 November 2019,...
Read More >
19th May
Precedents
1DefinitionsModern Slavery Policy•means the Customer's anti-slavery and human trafficking policy as set out in Schedule [insert] as updated by the...
Read More >
19th May
Practice notes
High-risk third countries trackerOrganisations caught by the Money Laundering, Terrorist Financing and Transfer of Funds (Information on the Payer)...
Read More >
19th May
Practice notes
Active bribery, passive bribery and bribing foreign public officialsThe purpose of this Practice Note is to provide a general understanding of the...
Read More >
Produced in partnership with Joanne Kane of Carmelite Chambers 19th May
Precedents
In briefThis precedent links to: •a template created by the UK Information Commissioner’s Office (ICO) of the ‘Set II’ or ‘2004’ EU Standard...
Read More >
19th May
Practice notes
Introduction to retained EU lawThis Practice Note provides an introduction to retained EU law. It provides an overview of the key definitions and...
Read More >
Produced in partnership with Dr. Kieran Laird of Gowling WLG 19th May
Practice notes
Safeguards and information barriersProtection of confidential information is fundamental to your relationship with clients, both as a matter of law...
Read More >
19th May
Practice notes
Undertakings and the SRA 2019What is an undertaking?An undertaking is:•a statement, given orally or in writing, whether or not it includes the word...
Read More >
19th May
Practice notes
Duties of confidentiality and disclosure 2019The protection of confidential information is a fundamental feature of the solicitor-client relationship...
Read More >
19th May
Precedents
1IntroductionThis financial sanctions policy is designed to ensure we comply with applicable financial sanctions laws made under the UK sanctions...
Read More >
19th May
Practice notes
SRA Handbook 2011 [Archived]The SRA Handbook 2011 sets out standards and requirements that individual lawyers and firms are expected to achieve and...
Read More >
19th May
Practice notes
Working with European lawyers—the Registered European Lawyer (REL) regimeAt 11 pm (GMT) on 31 December 2020, the Brexit transition/implementation...
Read More >
19th May

Most recent Information security content

Precedents
Data protection risk assessment—short form1Background informationAssessment for:[state whether the assessment relates to the whole firm or a specific...
Read More >
25th Aug
Practice notes
Information security—encryptionEncryption is a widely-available information security solution. It is relatively affordable and simple to implement, so...
Read More >
24th Aug
Precedents
Records retention schedule1Introduction1.1This Record retention schedule accompanies and is incorporated into [insert organisation’s name]’s Records...
Read More >
22nd Aug
Precedents
Passwords—quick guide to getting it rightThis quick guide can help you to create a strong password (that you won’t forget) and maintain the best...
Read More >
22nd Aug
Precedents
Data processing registerThis Precedent Data processing register will enable you to keep a record of the personal data you process and how it is...
Read More >
22nd Aug
Q&As
What can I do to protect confidential information in the workplace?What counts as confidential information?Confidential information is information...
Read More >
16th Aug
Practice notes
Information security—data protection complianceYou must have appropriate security in place to prevent personal data being accidentally or deliberately...
Read More >
16th Aug
Practice notes
Mitigating information and data security risks—law firmsYou must take appropriate technical and organisational measures against unauthorised or...
Read More >
Produced in partnership with DG Legal 16th Aug
Precedents
Information security policy—law firms1Introduction1.1We are committed to the highest standards of document and information management and security and...
Read More >
15th Aug
Precedents
Information audit form—law firmsInformationWhy is it processed?How is it stored?How is it used?How long is it needed?[Personnel files][To record...
Read More >
15th Aug
Precedents
Information management and security—annual review—law firmsA: General informationDate of reviewPerson(s) conducting reviewB: Review and findingsHave...
Read More >
15th Aug
Precedents
Training materials—information management and security—law firmsThis presentation has been designed as an aid to train your staff on your information...
Read More >
15th Aug
Precedents
Records management policy1Introduction1.1Maintaining business records in a systematic and reliable manner is essential to comply with our legal and...
Read More >
15th Aug
Precedents
Software registerSoftware registerSoftware nameProviderVersionDate introduced to firmUsed forRestrictionsComments[Word][Microsoft][2013][5 May...
Read More >
15th Aug
Precedents
Password policy1Introduction1.1Passwords are a critical aspect of our information and cyber security measures. They are our first line of...
Read More >
15th Aug
Precedents
Information and cybersecurity—supplier questionnaireIP COMPLETION DAY: The Brexit transition period ended at 11pm on 31 December 2020. At this time...
Read More >
15th Aug
Precedents
Information security review—law firms1Policies and proceduresICO expectationAdditional guidanceAction points (if any)☐  You have a process in place to...
Read More >
15th Aug
Precedents
Clear desk and clear screen policy—law firms1Responsibility1.1[Insert name and/or job title eg, The Risk manager] is responsible for this...
Read More >
15th Aug
Precedents
Cybercrime prevention strategy and incident management plan1Introduction1.1This strategy and plan builds on and supplements our other data management...
Read More >
15th Aug
Precedents
Remote working and removable media policy—law firms1Introduction1.1While remote working (whether at home or on the go) and removable media offer our...
Read More >
15th Aug

Popular documents